News Categories
(34)Malware (39)Malicious emails (11)Web 2.0 (24)Facebook (22)Social Networks (44)Spam (2)Defensio (1)Comment Spam (15)Phishing (9)Web spam (4)Click-jacking (38)Compromise (20)Analysis (38)Exploits (14)Research (3)Presentations (3)Conferences (4)security conference (9)Mass Injection (10)Rogue AV (4)Blackhat SEO (2)Neosploit (23)Targeted attacks (7)Video (14)Zeus (5)Microsoft (4)Monthly Reports (1)twitter (3)Google (18)Vulnerabilities (9)Adobe (12)Java (4)Mobile (4)Apple (1)hacked (1)TAB (1)Black Hat USA 2011 (1)Google+ (20)0-day (1)CVE-2010-2884 (1)CVE-2011-1255 (1)Worm (14)Blackhole exploit kit (1)Incognit Exploit kit (2)Tuesday Patch (6)APT (6)Typosquatting (3)Vulnerability Analysis (1)CVE-2011-3402 (4)Web Research (4)Predictions (3)Adult (5)News (3)Black Hat SEO (6)Data loss (8)Scam (1)QR codes (6)Twitter (1)CVE-2012-0003 (1)CVE-2011-3389 (1)CVE-2012-0004 (1)Phoenix Exploit Kit (1)CrimePack (3)Reverse Engineering (2)Captcha (1)Valentine's day (2)Kelihos (1)SC Magazine Award Winner (1)Wordpress (1)MS12-010 (1)CVE-2012-0002 (1)Infosec (2)CVE-2012-0507 (8)Toolkits (1)Skywiper (2)Flame (1)Flamer (2)Passwords (1)freedom of expression (1)censorship (2)Plugins (3)Malvertising (14)Exploit (1)CVE-2012-1723 (1)CSI (2)ThreatSeeker (2)Adventures in Spam (1)CVE-2012-4681 (1)LBS (2)RAT (1)module Apache/2 (1)Cyber Monday (1)Black Friday (1)Pastebin (4)CVE-2012-4792 (1)iPad (1)super bowl (1)iPhone (2)iOS (4)Spear Phishing (1)Threat Report (3)ThreatScope (1)Dynamic DNS (1)China (1)SSL (1)APT1 (2)DLP (3)Hack (1)CVE-2012-4969 (2)threat lifecycle (1)ThreatSeeker Network (1)ACE (10)exploit kit (1)blackhole (2)Black Hole (1)DNS poisoning (1)RedKit Exploit Kit (4)exploit kits (1)threat stages (1)Certificates (1)Topical (1)Waterhole (1)CVE-2013-2463 (1)Neutrino exploit kit (1)CVE-2013-2473 (1)CVE-2013-3893 (2)Collective Threat Intelligence (1)CVE-2013-3963 (1)Targeted Attack (3)Advanced Malware (1)CVE-2013-3897 (1)Tor (5)cyber-crime (1)Mevade (2)Ransomware (3)Social Engineering (1)CookieBomb (2)LinkedIn (1)CVE-2013-3906 (2)Pony (3)Cryptolocker (2)Upatre (1)application telemetry (1)meta-data (3)dr. watson (1)windows error reporting (1)big data (2)data theft prevention (1)DTP (1)telemetry (2)CVE-2014-0322 (2)MSIE 0-day (1)Deputy Dog (1)Ephemeral Hydra (1)CVE-2013-0074 (1)CVE-2013-3896 (1)Silverlight (2)crash reports (1)POS (1)anomaly detection (1)goon (4)angler (1)ru:8080 (1)magnitude (3)flash (1)CVE-2013-2465 (1)malicious iframes (1)FIESTA (1)Exploits Kit (1)iframe (3)CVE-2014-0160 (2)OpenSSL (3)Heartbleed (3)Citadel (2)CVE-2014-1776 (1)VGX.DLL (1)necrus (1)cutwail (2)gameover (3)vulnerability (3)zbot (1)control panel (1)carberp (1)zberp (1)Caphaw (2)Nuclear exploit kit (1)Shylock (1)Dragonfly (1)Zeus PIF (1)bitly (1)fraud (2)RIG Exploit Kit (1)POS malware (1)Point Of Sale Malware (1)Ukraine (1)Russia (1)Shellshock (1)CVE-2014-6271 (1)poodle (1)cve-2014-3566 (1)sslv3 (1)Ebola (1)CVE-2014-4114 (1)CPA (1)Regin (1)CVE-2015-0311 (1)CVE-2015-0235 (1)linux (1)GHOST (1)CVE-2015-0072 (1)Internet Explorer (1)XSS (1)IE (1)TorrentLocker (1)Product Information (1)Money Laundering (1)APSA10-05 (1)Skype spam
RSS Feed
News
Feb
4
Spammers, the Pioneers of Going Green
Posted by Ran Mosessco on 04 February 2011 01:01 AM

As we have noted, spam levels are starting to climb back up. Here at Websense Security Labs™, we want to highlight a familiar campaign theme that has been repackaged by spammers, as seen by our ThreatSeeker™ Network.

Websense messaging customers have been protected against this attack with ACE.

 

Around mid-January, we started to see a campaign of emails trying to recruit the recipient to help with payment processing in Australia. This is typically the type of money-laundering scam where victims are offered payment for transferring money through their private bank account. Naturally, the most likely outcome is that the "payment processing agents" don't gain any money, but instead lose their own money. They may also be prosecuted by the authorities as an accomplice to the crime.

 

We still see the familiar email messages with the full offer outlined in the body of the message (see figures 8 and 9 below). In this campaign, however, to avoid anti-spam products, the criminals have introduced a different type of message. These messages use much more generic text with less suspicious wording, and contain links to compromised Web sites. This way, the text (which is randomized) doesn't trigger content rules. What's more, since the links go to domains with good reputations, the spammers hope to bypass reputation-based filtering.

 

If all this sounds familiar, you're right: this is the same technique spammers were using in pharmaceutical and OEM software spam campaigns back in October 2010. (These are still going on, by the way. See figure 4).

 

As long as we can remember here at Websense Security Labs™, spammers have been recycling as much as possible, from expired domain names to images, and, of course, HTML templates. In this case, we see an age-old scam get new life when it's repackaged in a template already used for pharmaceutical spam.

 

So, let's follow the pictures to take a look at this enticing, career changing, offer.

 

The messages arrive in these formats:

 

Figure 1:

 

Figure 2:

 

 

But the older style is still in the wild:

 

Figure 3:

 

Doesn't this look like the pharmaceutical spam we've been seeing since last October?

 

Figure 4:

 

And, lo and behold, this template has been appearing in dating spam, yet another recycling effort:

 

Figure 5:

 

Beyond the similar physical appearance of the examples, the HTML source shows common structures that lead us to believe the templates came from the same author. The URL query structure is also very similar, providing a further hint to the common source. Most, but not all, of the messages also share some common header attributes.

Admittedly, it initially seems like a stretch to compare the first two examples (figures 1 and 2) to the older style, but without going into specifics, we can say the HTML source shows how spammers like to recycle templates. The URL and header patterns are too similar to be a coincidence.

 

Some of the many subject lines are:

 

A wonderful job offer for you!
Apply Now! Only few positions left!
Apply Now! Opportunity for individuals who have the ability to manage themselves.
Come join a team of highly-motivated individuals!
Excellent Job Offer!
Find A Job Australia
Flexible daytime schedule, excellent compensation and a wide variety of leads!
Great Job! Great Schedule! Awesome Pay!
Job Australian
Job Australian Details
Job in Australia
Job Offer Tools and Resources
Job offer working from home?
JOB OFFER, PLEASE READ THE CONTENT
Job offers Europe, international jobs - Jobware International
Multiple Job Offers
Offers for Australian Man - 18$ a day
Offers for Australian Man - 5,000$ a month
Offers for Australian Peoples - 18$ a day
Offers for Australian Peoples - 5,000$ a month
Offers for Australian Women - 28$ a day
Only for responsible, dedicated, and ambitious individuals!
Part-time position with flexible working hours!
Popular Job in Australia
Profitable job became simple!
Suitable position for you!
The Hottest Job Offer you just can't miss!
Want to make a change in your career?
What Type of Jobs Offer Home Based Work
Work at home careers
Work at home ideas
Work at home ideas. okford.
Work at home online jobs
Your Job Offer for Australian

 

Clicking the link in the message leads you to a page on a compromised site, hosting a spoofed version of a legitimate job search site:

 

Figure 6:

 

 

Hoping for some extra cash, I decided to apply, and shortly afterward, I got an email from a gentleman calling himself Daniel Chan:

 

Figure 7:

 

Now, this is more like it! This is what we're used to seeing in our inboxes, like this job scam sent by the Cutwail botnet:

 

Figure 8:

 

 

Or this more old school attempt:

 

Figure 9:

 

Back to the original scam attempt, when I check out the Web site that Mr. Chan provided, I can see how serious this operation is:

 

Figure 10:

 

And, luckily for me, the job is still available:

 

Figure 11:

 

A quick check of the domain information of this respectable company shows it was registered on Dec 17, 2010 for 1 year.

Not planning to stay in business very long, I guess...a quick check in Google leads us to this ScamFraudAlert blog post.

As you can see, the template is used for around 20 other domains (something else we've seen done for a couple of years). The language is far from the broken English used by older fraud attempts. There is a very large FAQ section trying to convince visitors that everything is legitimate.

 

By omitting the target site and job details from the email message, the criminals are trying to increase the chance that a few uninformed users will fall into the trap, however unlikely that may be.

 

Using links to pages on compromised, legitimate sites, while still crude, can help bypass spam filters. Avoiding "incriminating" phrases and using more generic randomized text also make it more difficult to for content-based filtering.

 

We predict more of these attempts in the future, most likely using more sophisticated, spoofed sites that will try to snare more victims.

The more general conclusion we can derive from this is that even smaller-scale scam operations benefit from spammers' botnets, which make it easy to reach more victims. The spammers can easily create new campaigns (for their "customers") by recycling existing templates, and then automate the "repackaging" process that uses compromised domains, URL shorteners, or free hosting domains.

 

As always, we recommend that you never click on any links found in unfamiliar emails, and that you use common sense. If an offer sounds too good to be true, it probably is.

Now, excuse me, but there's a beautiful woman who viewed my profile online (figure 5) and fell in love with me. I have got to follow up on that...


Read more »